[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101286844B - 一种支持快速切换的实体双向鉴别方法 - Google Patents

一种支持快速切换的实体双向鉴别方法 Download PDF

Info

Publication number
CN101286844B
CN101286844B CN200810018333A CN200810018333A CN101286844B CN 101286844 B CN101286844 B CN 101286844B CN 200810018333 A CN200810018333 A CN 200810018333A CN 200810018333 A CN200810018333 A CN 200810018333A CN 101286844 B CN101286844 B CN 101286844B
Authority
CN
China
Prior art keywords
entity
differentiate
discriminating
differentiating
elements
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200810018333A
Other languages
English (en)
Other versions
CN101286844A (zh
Inventor
铁满霞
曹军
黄振海
赖晓龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Iwncomm Co Ltd
Original Assignee
China Iwncomm Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Iwncomm Co Ltd filed Critical China Iwncomm Co Ltd
Priority to CN200810018333A priority Critical patent/CN101286844B/zh
Publication of CN101286844A publication Critical patent/CN101286844A/zh
Priority to PCT/CN2009/072023 priority patent/WO2009143778A1/zh
Priority to KR1020107029188A priority patent/KR101254868B1/ko
Priority to US12/994,712 priority patent/US8392710B2/en
Priority to JP2011509846A priority patent/JP5257717B2/ja
Priority to EP09753496.0A priority patent/EP2282444B1/en
Application granted granted Critical
Publication of CN101286844B publication Critical patent/CN101286844B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及一种支持快速切换的实体双向鉴别方法,其涉及三个安全元素,两个鉴别元素A和B及一个可信第三方TP,其中可信第三方TP为鉴别元素A和B的可信第三方;鉴别元素A包含n个鉴别实体A1、A2、…、An,鉴别元素B包含m个鉴别实体B1、B2、…、Bm,且B1、B2、…、Bm之间具有同步信息。本发明不仅实现了对公开密钥的集中管理,简化了协议的运行条件,而且使用安全域的概念,在保障鉴别实体每对每密钥、每鉴别每密钥、前向保密等安全特性的前提下,降低了公开密钥的管理复杂度,缩短了鉴别时间,满足了网络快速切换需求。

Description

一种支持快速切换的实体双向鉴别方法
技术领域
本发明涉及一种支持快速切换的实体双向鉴别方法。
背景技术
采用非对称密码技术的实体鉴别方法分为两种类型,即单向鉴别和双向鉴别。鉴别的唯一性或时效性由时变参数进行标识,常被用作时变参数的有时戳、顺序号和随机数等。若采用时戳或顺序号作为时变参数,则单向鉴别只需要采用一次消息传递,双向鉴别需要采用两次消息传递;若采用随机数作为时变参数,则单向鉴别需要采用两次消息传递,双向鉴别需要采用三次消息传递或四次消息传递(即两次消息传递的并行鉴别)。
不论上述哪种鉴别机制,在运行之前或运行当中,验证者必须具有声称者的有效公开密钥,否则鉴别过程会受到损害或不能成功完成。在此,以双向鉴别的三次传递方法为例进行说明:
参见图1,权标TokenAB=RA||RB||B||Text3||sSA(RA||RB||B||Text2),TokenBA=RB||RA||A||Text5||sSB(RB||RA||A||Text4)。其中,X为实体区分符,该鉴别系统有A和B两个鉴别实体;CertX表示实体X的证书;sSX表示实体X的签名;RX表示实体X产生的随机数;Text为可选文本字段。
三次传递鉴别机制运行过程详述如下:
1)实体B发送随机数RB、可选项文本Text1给实体A;
2)实体A发送权标TokenAB、可选项证书CertA给实体B;
3)实体B收到实体A发送的消息后,执行以下步骤:
3.1)通过检验实体A的证书或通过别的方式确保拥有实体A的有效公开密钥。
3.2)获取实体A的公钥后,验证步骤2)中的TokenAB的签名,校验区分符B的正确性,并检查步骤1)中发送的随机数RB和TokenAB中的随机数RB是否相符,实体B完成对实体A的验证;
4)实体B发送权标TokenBA、可选项证书CertB给实体A;
5)实体A收到实体B发送的包括TokenBA的消息后,执行以下步骤:
5.1)通过检验实体B的证书或通过别的方式确保拥有实体B的有效公开密钥;
5.2)获取实体B的公钥后,验证4)中的TokenBA的签名,校验区分符A的正确性,并检查步骤2)中发送的随机数RA和TokenBA中的随机数RA是否相符及1)中收到的随机数RB和TokenBA中的随机数RB是否相符;实体A完成对实体B的验证。
可见,三次传递鉴别机制欲运行成功必须确保实体A和B分别拥有对方的有效公开密钥,而如何获得对方公开密钥及其有效性,协议本身并没有涉及。这一保障需求条件在目前很多应用环境下都不能满足,比如通信网络通常采用实体鉴别机制实现用户接入控制功能,在鉴别机制成功完成前,禁止用户访问网络,因而在鉴别之前用户无法或难以访问证书机构获得对端实体——网络接入点公开密钥及其有效性。
目前通信网络通常需要在用户和网络接入点之间完成双向鉴别,以确保合法用户接入合法网络,因此对于网络实体而言,在鉴别之前若不需知晓通信对端实体的有效公开密钥,而是在鉴别过程中完成对端实体公开密钥的验证,则不仅完善了传统的实体鉴别机制,而且使其在实际应用中具有良好的可行性和易用性.另外,不论上述哪种鉴别机制,驻留有鉴别实体的某台设备每次关联至其他不同的设备时,均需要执行一次完整的鉴别协议,若应用在通信网络中,则存在能否满足快速切换的需求问题;每个鉴别实体均需要安装一对公私钥,这对于大型网络而言,公钥管理复杂度较大.因此,协议的设计应在保障鉴别功能的基础上,尽可能降低网络管理复杂度,满足快速切换需求.
发明内容
本发明为解决背景技术中存在的上述技术问题,而提出一种支持快速切换的实体双向鉴别方法。
本发明的技术解决方案是:本发明为一种支持快速切换的实体双向鉴别方法,其涉及三个安全元素,两个鉴别元素A和B及一个可信第三方TP,其中可信第三方TP为鉴别元素A和B的可信第三方;鉴别元素A包含n个鉴别实体A1、A2、…、An,鉴别元素B包含m个鉴别实体B1、B2、…、Bm,且B1、B2、…、Bm之间具有同步信息,如时钟同步;其特殊之处在于:对于其中任一对鉴别实体Ai(i=1,2,…,n)和Bj(j=1,2,…,m),其鉴别方法包括以下步骤:
1)鉴别实体Bj发送鉴别激活消息INIBj给鉴别实体Ai;其中:
INIBj=RBj||IDB||Text1;
2)鉴别实体Ai收到鉴别激活消息INIBj后,向鉴别实体Bj发送接入鉴别请求消息AREQAi;其中:
AREQAi=RBj||RAi||IDA||Text2||TokenAB
TokenAB=sSA(RBj||RAi||IDA||Text2);
3)鉴别实体Bj收到接入鉴别请求消息AREQAi并对其进行验证后,向可信第三方TP发送身份鉴别请求消息IREQBj,执行步骤4);或者直接执行步骤8);其中:
IREQBj=RAi||TBj||IDA||IDB||Text3;
4)可信第三方TP收到身份鉴别请求消息IREQBj后,检查鉴别元素A和鉴别元素B是否合法;
5)可信第三方TP检查完鉴别元素A和元素B的合法性后,向鉴别实体Bj返回身份鉴别响应消息IRESTP;其中:
IRESTP=TokenTB。
TokenTB=RAi||PubB||TBj|||PubA||Text4
||sSTP(RAi||PubB||TBj||PubA||Text4);
6)鉴别实体Bj收到身份鉴别响应消息IRESTP,对其验证通过后,本地进行存储,同时向鉴别元素B中的其他鉴别实体B1、B2、...、Bm(不包括Bj)发送身份鉴别响应消息IRESTP
7)鉴别元素B中的其他鉴别实体B1、B2、...、Bm(不包括Bj)收到身份鉴别响应消息IRESTP,对其验证通过后,进行本地存储;
8)鉴别实体Bj向鉴别实体Ai发送接入鉴别响应消息ARESBj,并计算鉴别实体Ai和Bj之间的共享主密钥;其中:
ARESBj=TokenTB||RAi||Text5||TokenBA
TokenBA=sSB(TokenTB||RBj||RAi||Text5);
9)鉴别实体Ai收到接入鉴别响应消息ARESBj后,进行验证。
上述步骤3)中鉴别实体Bj对接入鉴别请求消息AREQAi的具体验证过程如下:验证AREQAi中的RBj是否与INIBj中的RBj一致,若不一致,则直接丢弃AREQAi;否则查询本地是否存有鉴别元素A的鉴别结果,若没有存储,则向可信第三方TP发送身份鉴别请求消息IREQBj,执行步骤4);若有存储,则直接执行步骤8)。
上述步骤4)中:若身份鉴别请求消息IREQBj中鉴别元素A和B的身份标识IDA和IDB为证书,则检查鉴别元素A和B的证书CertA和CertB的有效性,若无效,则直接丢弃身份鉴别请求消息IREQBj或返回身份鉴别响应消息IRESTP;若有效,返回身份鉴别响应消息IRESTP,执行步骤5);
上述步骤4)中:若身份鉴别请求消息IREQBj中鉴别元素A和B的身份标识IDA和IDB为区分符,则搜索并检查鉴别元素A和B相应的公钥PublicKeyA和PublicKeyB及其有效性;若搜索不到对应的公钥或公钥无效,则直接丢弃身份鉴别请求消息IREQBj或返回身份鉴别响应消息IRESTP;若搜索到且有效,则返回身份鉴别响应消息IRESTP,执行步骤5);
上述步骤6)中鉴别实体Bj验证的具体过程如下:
6.1)验证TokenTB中可信第三方TP的签名后,检查IRESTP中的TBj与IREQBj中的TBj是否相符,这些验证通过后得到鉴别元素A的验证结果PubA
6.2)若鉴别元素A无效,则结束;否则,获取鉴别元素A的公钥PublicKeyA,验证TokenAB中鉴别元素A的签名,若不正确,则结束;否则本地存储身份鉴别响应消息ARESBj,并向鉴别元素B的其他鉴别实体转发身份鉴别响应消息ARESB,执行步骤7);
上述步骤7)中鉴别实体B1、B2、...、Bm(不包括Bj)验证的具体过程如下:根据TBj和本地同步信息判断身份鉴别响应消息IRESTP的新鲜性,验证TokenTB中可信第三方TP的签名,若正确,则得到鉴别元素A的验证结果PubA,并本地存储身份鉴别响应消息IRESTP
上述步骤8)中鉴别实体Bj根据RBj和RAi进行DH计算,将得到的值作为鉴别实体Ai和Bj之间的共享主密钥。
上述步骤9)中验证的具体过程如下:验证TokenTB中可信第三方TP的签名,验证TokenBA中鉴别元素B的签名,验证接入鉴别响应消息ARESBj的RAi是否与接入鉴别请求消息AREQAi中的RAi相符,这些验证通过后则得到鉴别元素B的验证结果PubB;若鉴别元素B无效,则鉴别失败,否则获取鉴别元素B的公钥PublicKeyB,验证TokenBA中鉴别元素B的签名,若不正确,则鉴别失败,否则根据RBj和RAi进行DH计算得到鉴别实体Ai和Bj之间的共享主密钥,鉴别实体Ai和Bj完成相互鉴别。
本发明使用安全域的概念,将空间位置相邻或空间位置移动轨迹相同或路由相同的若干鉴别实体划分为一个安全域,在鉴别过程中每个安全域相当于一个鉴别元素,同一安全域中的所有鉴别实体共享一张公钥证书或拥有同一个公钥,根据网络情况,要求某些安全域中的鉴别实体具有同步信息.在鉴别之前每个鉴别元素获得可信第三方的公钥或公钥证书,并获得可信第三方颁发给自己的用户公钥证书或将自己的公钥交给可信第三方保管.位于不同安全域中的两个鉴别实体需要鉴别时,若它们所属的两个安全域之间从未运行过鉴别协议,则执行完整的鉴别协议过程,即鉴别实体各自的公开密钥及其有效性通过可信第三方的搜索和验证,自动传递给所需的对端;若所属的两个安全域之间已运行过鉴别协议,即已有位于这两个安全域中的鉴别实体进行过鉴别,则不再执行完整的协议过程,即可省去鉴别实体和可信第三方的协议数据交互,鉴别仅在两个鉴别实体之间进行.
本发明相比传统鉴别机制,不仅定义了公开密钥的在线检索和鉴别机制,实现了对它的集中管理,简化了协议的运行条件,而且使用安全域的概念,在保障鉴别实体每对每密钥、每鉴别每密钥、前向保密等安全特性的前提下,大大降低了公开密钥的管理复杂度,缩短了鉴别时间,有利于满足网络快速切换需求。
附图说明
图1为现有技术中三次传递鉴别机制的鉴别示意图;
图2为本发明的鉴别示意图;
图3、4为本发明的具体实施例的鉴别示意图。
具体实施方式
本发明的方法涉及三个安全元素,即两个鉴别元素A和B及一个可信第三方TP(Trusted third Party),其中可信第三方TP为鉴别元素A和B的可信第三方;鉴别元素A包含n个鉴别实体A1、A2、…、An,鉴别元素B包含m个鉴别实体B1、B2、…、Bm,且B1、B2、…、Bm之间具有同步信息,这里同步信息使用时钟。将这种通过可信第三方TP实现两鉴别元素A和B之间对等鉴别的系统,称之为三元对等鉴别TePA(Tri-element Peer Authentication)系统。
为了使本发明的目的、技术方案及优点更加清楚明了,下面列举实施例并参照附图,作进一步详细说明。
Xi为鉴别元素X中的鉴别实体;RXi表示鉴别实体Xi产生的随机数;TXi表示鉴别实体Xi产生的时戳。
CertX为鉴别元素X的公钥证书;IDX为鉴别元素X的身份标识,由证书CertX或者鉴别元素的区分符X表示;ValidX表示证书CertX的有效性;PublicKeyX为鉴别元素X的公钥;PubX表示鉴别元素X的验证结果,由证书CertX及其有效性ValidX组成或者由鉴别元素X及其公钥PublicKeyX组成。
Token为权标字段;Text为可选文本字段。
参见图2,对于任一对鉴别实体Ai(i=1,2,…,n)和Bj(j=1,2,…,m)之间的鉴别过程,或者包含鉴别激活消息INIBi、接入鉴别请求消息AREQAi、身份鉴别请求消息IREQBj、身份鉴别响应消息IRESTP、接入鉴别响应消息ARESBj5个消息,或者仅包含鉴别激活消息INIBj、接入鉴别请求消息AREQAi、接入鉴别响应消息ARESBj3个消息。
具体鉴别过程如下:
1)鉴别实体Bj发送鉴别激活消息INIBj给鉴别实体Ai;
其中:
INIBj=RBj||IDB||Text1
2)鉴别实体Ai收到鉴别激活消息INIBj后,向鉴别实体Bj发送接入鉴别请求消息AREQAi
其中:
AREQAi=RBj||RAi||IDA||Text2||TokenAB
TokenAB=sSA(RBj||RAi||IDA||Text2)
3)鉴别实体Bj收到接入鉴别请求消息AREQAi并对其进行验证后,向可信第三方TP发送身份鉴别请求消息IREQBj,执行步骤4);或者直接执行步骤8);
其中:
IREQBj=RAi||TBj||IDA||IDB||Text3;
鉴别实体Bj对接入鉴别请求消息AREQAi的验证过程如下:验证AREQAi中的RBj是否与INIBj中的RBj一致,若不一致,则直接丢弃AREQAi;否则查询本地是否存有鉴别元素A的鉴别结果,若没有存储,则向可信第三方TP发送身份鉴别请求消息IREQBj,执行步骤4);若有存储,则直接执行步骤8);
4)可信第三方TP收到身份鉴别请求消息IREQBj后,检查鉴别元素A和鉴别元素B是否合法;
其中:
若身份鉴别请求消息IREQBj中鉴别元素A和B的身份标识IDA和IDB为证书,则检查鉴别元素A和B的证书CertA和CertB的有效性,若无效,则直接丢弃身份鉴别请求消息IREQBj或返回身份鉴别响应消息IRESTP;若有效,返回身份鉴别响应消息IRESTP,执行步骤5);
若身份鉴别请求消息IREQBj中鉴别元素A和B的身份标识IDA和IDB为区分符,则搜索并检查鉴别元素A和B相应的公钥PublicKeyA和PublicKeyB及其有效性;若搜索不到对应的公钥或公钥无效,则直接丢弃身份鉴别请求消息IREQBj或返回身份鉴别响应消息IRESTP;若搜索到且有效,则返回身份鉴别响应消息IRESTP,执行步骤5);
5)可信第三方TP检查完鉴别实体Ai和Bj的合法性后,向鉴别实体Bj返回身份鉴别响应消息IRESTP
其中:
IRESTP=TokenTB。
TokenTB=RAi||PubB||TBj|||PubA||Text4
||sSTP(RAi||PubB||TBj||PubA||Text4)
6)鉴别实体Bj收到身份鉴别响应消息IRESTP,对其验证通过后,本地进行存储,同时向鉴别元素B中的其他鉴别实体B1、B2、...、Bm(不包括Bj)转发身份鉴别响应消息IRESTP
其中:
鉴别实体Bj对身份鉴别响应消息IREQTP的验证过程如下:(1)验证TokenTB中可信第三方TP的签名后,检查IRESTP中的TBj与IREQBj中的TBj是否相符,这些验证通过后得到鉴别元素A的验证结果PubA;(2)若鉴别元素A无效,则结束;否则,获取鉴别元素A的公钥PublicKeyA,验证TokenAB中鉴别元素A的签名,若不正确,则结束;否则本地存储身份鉴别响应消息ARESBj,并向鉴别元素B的其他鉴别实体转发身份鉴别响应消息ARESB,执行步骤7);
7)鉴别元素B中的其他鉴别实体B1、B2、...、Bm(不包括Bj)收到身份鉴别响应消息IRESTP,对其验证通过后,进行本地存储;
其中:
鉴别实体B1、B2、...、Bm(不包含Bj)对身份鉴别响应消息IREQTP的验证过程如下:根据TBj和本地时钟判断身份鉴别响应消息IRESTP的新鲜性,验证TokenTB中可信第三方TP的签名,若正确,则得到鉴别元素A的验证结果PubA,并本地存储身份鉴别响应消息IRESTP
8)鉴别实体Bj向鉴别实体Ai发送接入鉴别响应消息ARESBj,并计算鉴别实体Ai和Bj之间的共享主密钥;
其中:
ARESBj=TokenTB||RAi||Text5||TokenBA
TokenBA=sSB(TokenTB||RBj||RAi||Text5)
鉴别实体Bj根据RBj和RAi进行DH计算,将得到的值作为鉴别实体Ai和Bj之间的共享主密钥。
9)鉴别实体Ai收到接入鉴别响应消息ARESBj后,进行验证。
其中:
鉴别实体Ai对接入鉴别响应消息ARESBj的验证包括验证TokenTB中可信第三方TP的签名,验证TokenBA中鉴别元素B的签名,验证接入鉴别响应消息ARESBj的RAi是否与接入鉴别请求消息AREQAi中的RAi相符,这些验证通过后则鉴别实体Ai得到鉴别元素B的验证结果PubB;若鉴别元素B无效,则鉴别失败,否则获取鉴别元素B的公钥PublicKeyB,验证TokenBA中鉴别元素B的签名,若不正确,则鉴别失败,否则根据RBj和RAi进行DH计算得到鉴别实体Ai和Bj之间的共享主密钥,鉴别实体Ai和Bj完成相互鉴别。
在两个鉴别元素已通过可信第三方完成相互鉴别的情况下,分属于这两个安全域的鉴别实体根据本地策略,还可要求执行完整的鉴别过程。若鉴别元素B中的鉴别实体有此需求,则当收到对端鉴别实体发来的接入鉴别请求消息时,不论本地是否存储有鉴别结果,鉴别元素B中的鉴别实体向可信第三方TP发送身份鉴别请求消息;若鉴别元素A中的鉴别实体希望执行完整的鉴别过程,则可通过接入鉴别请求消息中的可选性字段进行标识,则位于鉴别元素B中的对端鉴别实体识别该字段后,向可信第三方TP发送身份鉴别请求消息,以执行完整的鉴别过程。
参见图3,假设鉴别实体A1需要与鉴别实体B1完成鉴别,此时若所属的鉴别元素A和B之间从未执行过鉴别过程,则实体A1和B1的鉴别具体流程如下:
1)鉴别实体B1发送鉴别激活消息INIB1给鉴别实体A1;
其中:
INIB1=RB1||IDB||Text1
2)鉴别实体A1收到鉴别激活消息INIB1后,向鉴别实体B1发送接入鉴别请求消息AREQA1
其中:
AREQA1=RB1||RA1||IDA||Text2||TokenAB
TokenAB=sSA(RB1||RA1||IDA||Text2)
3)鉴别实体B1收到接入鉴别请求消息AREQA1并对其进行验证后,向可信第三方TP发送身份鉴别请求消息IREQB1
其中:
IREQB1=RA1||TB1||IDA||IDB||Text3;
鉴别实体B1对接入鉴别请求消息AREQA1的验证过程如下:验证AREQA1中的RB1是否与INIB1中的RB1是否一致,若一致,则向可信第三方TP发送身份鉴别请求消息IREQB1;否则直接丢弃AREQA1
4)可信第三方TP收到身份鉴别请求消息IREQB1后,检查鉴别元素A和B是否合法;
其中:
若身份鉴别请求消息IREQB1中鉴别元素A和B的身份标识IDA和IDB为证书,则检查鉴别元素A和B证书的CertA和CertB的有效性,若无效,则直接丢弃身份鉴别请求消息IREQB1或返回身份鉴别响应消息IRESTP;若有效,返回身份鉴别响应消息IRESTP,执行步骤5);
若身份鉴别请求消息IREQB1中鉴别元素A和B的身份标识IDA和IDB为区分符,则搜索并检查鉴别元素A和B相应的公钥PublicKeyA和PublicKeyB及其有效性;若搜索不到对应的公钥或公钥无效,则直接丢弃身份鉴别请求消息IREQB1或返回身份鉴别响应消息IRESTP;若搜索到且有效,则返回身份鉴别响应消息IRESTP,执行步骤5);
5)可信第三方TP检查完鉴别元素A和鉴别元素B的合法性后,向鉴别实体B1返回身份鉴别响应消息IRESTP
其中:
IRESTP=TokenTB。
TokenTB=RA1||PubB||TB1|||PubA||Text4
||sSTP(RA1||PubB||TB1||PubA||Text4)
6)鉴别实体B1收到身份鉴别响应消息IRESTP,对其验证通过后,本地进行存储,同时向鉴别元素B中的其他鉴别实体B2、B3、...、Bm转发身份鉴别响应消息IRESTP
其中:
鉴别实体B1对身份鉴别响应消息IREQTP的验证过程如下:(1)验证TokenTB中可信第三方TP的签名后,检查IRESTP中的TB1与IREQB1中的TB1是否相符,这些验证通过后得到鉴别元素A的验证结果PubA;(2)若鉴别元素A无效,则结束;否则,获取鉴别元素A的公钥PublicKeyA,验证TokenAB中鉴别元素A的签名,若不正确,则结束;否则本地存储身份鉴别响应消息ARESB1,并向鉴别元素B的其他鉴别实体转发身份鉴别响应消息ARESB1,执行步骤7)。
7)鉴别元素B中的其他鉴别实体B2、B3、...、Bm收到身份鉴别响应消息IRESTP,对其验证通过后,进行本地存储;
其中:
鉴别实体B2、B3、...、Bm对身份鉴别响应消息IREQTP的验证过程如下:根据TB1和本地同步信息(时钟)判断身份鉴别响应消息IRESTP的新鲜性,验证TokenTB中可信第三方TP的签名,若验证通过,则得到鉴别元素A的验证结果PubA,并本地存储身份鉴别响应消息IRESTP;否则,直接丢弃身份鉴别响应消息IRESTP
8)鉴别实体B1向鉴别实体A1发送接入鉴别响应消息IRESB1,并计算鉴别实体A1和B1之间的共享主密钥;
其中:
ARESB1=TokenTB||RA1||Text5||TokenBA
TokenBA=sSB(TokenTB||RB1||RA1||Text5)
鉴别实体B1根据RB1和RA1进行DH计算,将得到的值作为鉴别实体A1和B1之间的共享主密钥;
9鉴别实体A1收到接入鉴别响应消息ARESB1后,进行验证。
其中:
鉴别实体A1对接入鉴别响应消息ARESB1的验证包括验证TokenTB中可信第三方TP的签名,验证TokenBA中鉴别元素B的签名,验证接入鉴别响应消息ARESB1的RA1是否与接入鉴别请求消息AREQA1中的RA1相符,这些验证通过后则得到鉴别元素B的验证结果PubB;若鉴别元素B无效,则鉴别失败,否则获取鉴别元素B的公钥PublicKeyB,验证TokenBA中鉴别元素B的签名,若不正确,则鉴别失败,否则根据RB1和RA1进行DH计算,得到鉴别实体A1和B1之间的共享主密钥,鉴别实体A1和B1完成相互鉴别。
参见图4,鉴别实体A1和B1完成鉴别后,其他实体对之间需要鉴别,假设此时鉴别实体A2需要与鉴别实体B2完成鉴别,则其鉴别具体流程如下:
1)鉴别实体B2发送鉴别激活消息INIB2给鉴别实体A2;
其中:
INIB2=RB2||IDB||Text1
2)鉴别实体A2收到鉴别激活消息INIB2后,向鉴别实体B2发送接入鉴别请求消息AREQA2
其中:
AREQA2=RB2||RA2||IDA||Text2||TokenAB
TokenAB=sSA(RB2||RA2||IDA||Text2)
3)鉴别实体B2收到接入鉴别请求消息AREQA2后,结合本地存储的鉴别元素A的鉴别结果,对接入鉴别请求消息AREQA2进行验证后,向鉴别实体A2发送接入鉴别响应消息ARESB2,同时计算鉴别实体A2和B2之间的共享主密钥;
其中:
鉴别实体B2对接入鉴别请求消息AREQA2的验证过程如下:(1)验证AREQA2中的RB2是否与INIB2中的RB2一致;(2)若鉴别实体B2本地存储有鉴别元素A的鉴别结果且该鉴别结果为合法有效,则根据鉴别元素A的公钥PublicKeyA验证TokenAB中鉴别元素A的签名是否正确;
ARESB2=TokenTB||RA2||Text5||TokenBA
TokenBA=sSB(TokenTB||RB2||RA2||Text5)
鉴别实体B2根据RB2和RA2进行DH计算,将得到的值作为鉴别实体A2和B2之间的共享主密钥;
4)鉴别实体A2收到接入鉴别响应消息ARESB2后,进行验证。
其中:
鉴别实体A2的验证包括验证TokenTB中可信第三方TP的签名,验证TokenBA中鉴别元素B的签名,验证接入鉴别响应消息ARESB2中的RA2是否与接入鉴别请求消息AREQA2中的RA2相符,这些验证通过后则得到鉴别实体B2的验证结果PubB;若鉴别元素B无效,则鉴别失败,否则获取鉴别元素B的公钥PublicKeyB,验证TokenBA中鉴别元素B的签名,若不正确,则鉴别失败,否则根据RB2和RA2进行DH计算,得到鉴别实体A2和B2之间的共享主密钥,鉴别实体A2和B2完成相互鉴别。
本发明的方法不仅完成了鉴别实体之间的双向身份鉴别,而且保证每对实体、每次鉴别所协商的主密钥的唯一性与新鲜性,且主密钥具有前向保密性。
对于两个安全域A和B而言,按照传统方法,为每个鉴别实体分发一个公钥证书或一个公开密钥,则可信第三方TP需管理n×m个用户证书或公开密钥,若安全域A中的每个鉴别实体均需与安全域B中的每个鉴别实体完成鉴别时,则需要交互消息5×n×m个;采用本发明的方法,则可信第三方TP仅需管理2个用户证书或公开密钥,完成两两鉴别,最少仅需交互消息3×n×m+2个。可见,在安全性保障的前提下,本发明可明显降低网络管理复杂度,提高协议执行效率,满足切换需求。

Claims (7)

1.一种支持快速切换的实体双向鉴别方法,其涉及三个安全元素,两个鉴别元素A和B及一个可信第三方TP,其中可信第三方TP为鉴别元素A和B的可信第三方;鉴别元素A包含n个鉴别实体A1、A2、…、An,鉴别元素B包含m个鉴别实体B1、B2、…、Bm,且B1、B2、…、Bm具有同步信息,其特征在于:对于其中任一对鉴别实体Ai和Bj,其鉴别方法包括以下步骤:
1)鉴别实体Bj发送鉴别激活消息INIBj给鉴别实体Ai;其中:
INIBj=RBj||IDB||Text1;
2)鉴别实体Ai收到鉴别激活消息INIBj后,向鉴别实体Bj发送接入鉴别请求消息AREQAi;其中:
AREQAi=RBj||RAi||IDA||Text2||TokenAB
TokenAB=sSA(RBj||RAi||IDA||Text2);
3)鉴别实体Bj收到接入鉴别请求消息AREQAi并验证该消息AREQAi中的RBj是否与INIBj中的RBj一致,若不一致,则直接丢弃AREQAi;否则,查询本地是否存有鉴别元素A的鉴别结果,若没有存储,则向可信第三方TP发送身份鉴别请求消息IREQBj,执行步骤4);若有存储,则直接执行步骤8);
其中:
IREQBj=RAi||TBj||IDA||IDB||Text3;
4)可信第三方TP收到身份鉴别请求消息IREQBj后,检查鉴别元素A和鉴别元素B是否合法;
5)可信第三方TP检查完鉴别元素A和B的合法性后,向鉴别实体Bj返回身份鉴别响应消息IRESTP;其中:
IRESTP=TokenTB;
TokenTB=RAi||PubB||TBj|||PubA||Text4
||sSTP(RAi||PubB||TBj||PubA||Text4);
6)鉴别实体Bj收到身份鉴别响应消息IRESTP,对其验证通过后,本地进行存储,同时向鉴别元素B中的其他鉴别实体B1、B2、...、Bm转发身份鉴别响应消息IRESTP
7)所述鉴别元素B中的其他鉴别实体B1、B2、...、Bm收到身份鉴别响应消息IRESTP后,进行验证和存储;
8)鉴别实体Bj向鉴别实体Ai发送接入鉴别响应消息ARESBj,同时计算鉴别实体Ai和Bj之间的共享主密钥;其中:
ARESBj=TokenTB||RAi||Text5||TokenBA
TokenBA=sSB(TokenTB||RBj||RAi||Text5);
9)鉴别实体Ai收到接入鉴别响应消息ARESBj后,进行验证;
所述Ai中的i=1,2,…,n,所述Bj中的j=1,2,…,m。
2.根据权利要求1所述的支持快速切换的实体双向鉴别方法,其特征于:所述步骤4)中:若身份鉴别请求消息IREQBj中鉴别元素A和B的身份标识IDA和IDB为证书,则检查鉴别元素A和B的证书CertA和CertB的有效性,若无效,则直接丢弃身份鉴别请求消息IREQBj或返回身份鉴别响应消息IRESTP;若有效,返回身份鉴别响应消息IRESTP,执行步骤5)。
3.根据权利要求1所述的支持快速切换的实体双向鉴别方法,其特征于:所述步骤4)中:若身份鉴别请求消息IREQBj中鉴别元素A和B的身份标识IDA和IDB为区分符,则搜索并检查鉴别元素A和B相应的公钥PublicKeyA和PublicKeyB及其有效性;若搜索不到对应的公钥或公钥无效,则直接丢弃身份鉴别请求消息IREQBj或返回身份鉴别响应消息IRESTP;若搜索到且有效,则返回身份鉴别响应消息IRESTP,执行步骤5)。
4.根据权利要求2或3所述的支持快速切换的实体双向鉴别方法,其特征于:所述步骤6)中实体Bj的验证具体过程如下:
6.1)验证TokenTB中可信第三方TP的签名后,检查IRESTP中的TBj与IREQBj中的TBj是否相符,这些验证通过后得到鉴别元素A的验证结果PubA
6.2)若鉴别元素A无效,则结束;否则,获取鉴别元素A的公钥PublicKeyA,验证TokenAB中鉴别元素A的签名,若不正确,则结束;否则本地存储身份鉴别响应消息ARESBj,并向鉴别元素B的其他鉴别实体转发身份鉴别响应消息ARESB,执行步骤8)。
5.根据权利要求4所述的支持快速切换的实体双向鉴别方法,其特征于:步骤7)中所述鉴别元素B中的其他鉴别实体B1、B2、...、Bm的验证具体过程如下:根据TBj和本地同步信息判断身份鉴别响应消息IRESTP的新鲜性,验证TokenTB中可信第三方TP的签名,若正确,则得到鉴别元素A的验证结果PubA,并本地存储身份鉴别响应消息IRESTP
6.根据权利要求5所述的支持快速切换的实体双向鉴别方法,其特征于所述步骤8)中鉴别实体Bj根据RBj和RAi进行DH计算,将得到的值作为鉴别实体Ai和Bj之间的共享主密钥。
7.根据权利要求6所述的支持快速切换的实体双向鉴别方法,其特征于:所述步骤9)中验证的具体过程如下:验证TokenTB中可信第三方TP的签名,验证TokenBA中鉴别元素B的签名,验证接入鉴别响应消息ARESBj的RAi是否与接入鉴别请求消息AREQAi中的RAi相符,这些验证通过后则得到鉴别元素B的验证结果PubB;若鉴别元素B无效,则鉴别失败,否则获取鉴别元素B的公钥PublicKeyB,验证TokenBA中鉴别元素B的签名,若不正确,则鉴别失败,否则根据RBj和RAi进行DH计算得到鉴别实体Ai和Bj之间的共享主密钥,鉴别实体Ai和Bj完成相互鉴别。
CN200810018333A 2008-05-29 2008-05-29 一种支持快速切换的实体双向鉴别方法 Active CN101286844B (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CN200810018333A CN101286844B (zh) 2008-05-29 2008-05-29 一种支持快速切换的实体双向鉴别方法
PCT/CN2009/072023 WO2009143778A1 (zh) 2008-05-29 2009-05-27 一种支持快速切换的实体双向鉴别方法
KR1020107029188A KR101254868B1 (ko) 2008-05-29 2009-05-27 고속 핸드오프를 지원하는 엔티티 양방향 신원 방법
US12/994,712 US8392710B2 (en) 2008-05-29 2009-05-27 Entity bidirectional-identification method for supporting fast handoff
JP2011509846A JP5257717B2 (ja) 2008-05-29 2009-05-27 高速ハンドオフをサポートするエンティティ双方向識別方法
EP09753496.0A EP2282444B1 (en) 2008-05-29 2009-05-27 Entity bidirectional-identification method for supporting fast handoff

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810018333A CN101286844B (zh) 2008-05-29 2008-05-29 一种支持快速切换的实体双向鉴别方法

Publications (2)

Publication Number Publication Date
CN101286844A CN101286844A (zh) 2008-10-15
CN101286844B true CN101286844B (zh) 2010-05-12

Family

ID=40058828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810018333A Active CN101286844B (zh) 2008-05-29 2008-05-29 一种支持快速切换的实体双向鉴别方法

Country Status (6)

Country Link
US (1) US8392710B2 (zh)
EP (1) EP2282444B1 (zh)
JP (1) JP5257717B2 (zh)
KR (1) KR101254868B1 (zh)
CN (1) CN101286844B (zh)
WO (1) WO2009143778A1 (zh)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286844B (zh) 2008-05-29 2010-05-12 西安西电捷通无线网络通信有限公司 一种支持快速切换的实体双向鉴别方法
CN102014386B (zh) * 2010-10-15 2012-05-09 西安西电捷通无线网络通信股份有限公司 一种基于对称密码算法的实体鉴别方法及系统
US8593659B2 (en) * 2011-06-28 2013-11-26 Konica Minolta Laboratory U.S.A., Inc. System and method for third party authentication of web-based print-on-demand requests
CN103312670A (zh) * 2012-03-12 2013-09-18 西安西电捷通无线网络通信股份有限公司 一种认证方法及系统
CN103312672A (zh) * 2012-03-12 2013-09-18 西安西电捷通无线网络通信股份有限公司 身份认证方法及系统
CN103312499B (zh) 2012-03-12 2018-07-03 西安西电捷通无线网络通信股份有限公司 一种身份认证方法及系统
US8923880B2 (en) 2012-09-28 2014-12-30 Intel Corporation Selective joinder of user equipment with wireless cell
US9515824B2 (en) * 2013-10-21 2016-12-06 Aruba Networks, Inc. Provisioning devices for secure wireless local area networks
CN104954130B (zh) * 2014-03-31 2019-08-20 西安西电捷通无线网络通信股份有限公司 一种实体鉴别方法及装置
MX367997B (es) 2015-02-27 2019-09-13 Ericsson Telefon Ab L M Disposiciones de seguridad en comunicación entre un dispositivo de comunicación y un dispositivo de red.
CN106572066B (zh) * 2015-10-10 2019-11-22 西安西电捷通无线网络通信股份有限公司 一种实体身份有效性验证方法及其装置
US10382441B2 (en) * 2016-10-13 2019-08-13 Honeywell International Inc. Cross security layer secure communication
WO2019036940A1 (en) * 2017-08-23 2019-02-28 Qualcomm Incorporated SYSTEMS AND METHODS USING USER EQUIPMENT LATENCY REQUIREMENT (UE) FOR SELECTION OF A SYNCHRONIZATION SIGNAL BLOCK
GB2569130B (en) 2017-12-05 2020-11-04 Ali Musallam Ibrahim Method and system for sharing an item of media content
US10716037B2 (en) * 2018-10-11 2020-07-14 International Business Machines Corporation Assessment of machine learning performance with limited test data
CN113038459A (zh) * 2019-12-25 2021-06-25 中兴通讯股份有限公司 隐私信息传输方法、装置、计算机设备及计算机可读介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630405A (zh) * 2003-12-18 2005-06-22 中国电子科技集团公司第三十研究所 数字蜂窝移动通信系统用户切换时的双向鉴别方法
CN101136928A (zh) * 2007-10-19 2008-03-05 北京工业大学 一种可信网络接入框架
CN101145910A (zh) * 2007-10-23 2008-03-19 西安西电捷通无线网络通信有限公司 一种基于可信第三方的实体双向鉴别方法及其系统

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6336634A (ja) 1986-07-31 1988-02-17 Advance Co Ltd 暗号鍵共有方式
US5491750A (en) * 1993-12-30 1996-02-13 International Business Machines Corporation Method and apparatus for three-party entity authentication and key distribution using message authentication codes
JP3466975B2 (ja) 1999-11-02 2003-11-17 日本電信電話株式会社 公開鍵証明証の有効性確認システム及びその方法並びにそのプログラムを記録した媒体
WO2002096151A1 (en) * 2001-05-22 2002-11-28 Flarion Technologies, Inc. Authentication system for mobile entities
JP3754342B2 (ja) 2001-10-30 2006-03-08 日本電信電話株式会社 公開鍵証明書の有効性検証システム
US7577425B2 (en) * 2001-11-09 2009-08-18 Ntt Docomo Inc. Method for securing access to mobile IP network
JP3831331B2 (ja) 2001-11-09 2006-10-11 株式会社エヌ・ティ・ティ・ドコモ モバイルipネットワークへのアクセスを安全にする方法
JP3822555B2 (ja) * 2001-11-09 2006-09-20 株式会社エヌ・ティ・ティ・ドコモ 安全なネットワークアクセス方法
US7418596B1 (en) * 2002-03-26 2008-08-26 Cellco Partnership Secure, efficient, and mutually authenticated cryptographic key distribution
US7624270B2 (en) * 2002-11-26 2009-11-24 Cisco Technology, Inc. Inter subnet roaming system and method
JP4468449B2 (ja) 2004-08-26 2010-05-26 株式会社エヌ・ティ・ティ・ドコモ セキュアハンドオーバをサポートする方法および装置
US7412232B2 (en) 2004-12-22 2008-08-12 Research In Motion Limited Method and system for controlling software loads on a third-party mobile station
EP1867094A2 (en) * 2005-03-15 2007-12-19 Trapeze Networks, Inc. System and method for distributing keys in a wireless network
US20060274695A1 (en) * 2005-06-03 2006-12-07 Nokia Corporation System and method for effectuating a connection to a network
US20070055881A1 (en) 2005-09-02 2007-03-08 Fuchs Kenneth C Method for securely exchanging public key certificates in an electronic device
CN101288844B (zh) * 2007-04-20 2011-04-20 中国科学院大连化学物理研究所 一种固定化金属的亲和色谱固定相及其制备方法
CN101286844B (zh) 2008-05-29 2010-05-12 西安西电捷通无线网络通信有限公司 一种支持快速切换的实体双向鉴别方法
US8121073B2 (en) * 2008-06-13 2012-02-21 International Business Machines Corporation Future forwarding zones in a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630405A (zh) * 2003-12-18 2005-06-22 中国电子科技集团公司第三十研究所 数字蜂窝移动通信系统用户切换时的双向鉴别方法
CN101136928A (zh) * 2007-10-19 2008-03-05 北京工业大学 一种可信网络接入框架
CN101145910A (zh) * 2007-10-23 2008-03-19 西安西电捷通无线网络通信有限公司 一种基于可信第三方的实体双向鉴别方法及其系统

Also Published As

Publication number Publication date
JP5257717B2 (ja) 2013-08-07
US8392710B2 (en) 2013-03-05
KR20110016454A (ko) 2011-02-17
EP2282444A4 (en) 2016-11-23
EP2282444B1 (en) 2018-07-04
WO2009143778A1 (zh) 2009-12-03
EP2282444A1 (en) 2011-02-09
KR101254868B1 (ko) 2013-04-15
CN101286844A (zh) 2008-10-15
JP2011521571A (ja) 2011-07-21
US20110078438A1 (en) 2011-03-31

Similar Documents

Publication Publication Date Title
CN101286844B (zh) 一种支持快速切换的实体双向鉴别方法
CN101222328B (zh) 一种实体双向鉴别方法
CN100553193C (zh) 一种基于可信第三方的实体双向鉴别方法及其系统
US10284379B1 (en) Public key infrastructure based on the public certificates ledger
CN101247223B (zh) 一种基于可信第三方的实体双向鉴别方法
CN101635624B (zh) 引入在线可信第三方的实体鉴别方法
CN101640593B (zh) 一种引入在线第三方的实体双向鉴别方法
CN102420690B (zh) 一种工业控制系统中身份与权限的融合认证方法及系统
CN101645776B (zh) 一种引入在线第三方的实体鉴别方法
CN101364876B (zh) 一种实现实体的公钥获取、证书验证及鉴别的方法
CN101674182B (zh) 引入在线可信第三方的实体公钥获取、证书验证及鉴别的方法及系统
CN112199726A (zh) 一种基于区块链的联盟信任分布式身份认证方法及系统
KR20110054632A (ko) 익명 id 관리 장치 및 그 방법, 익명 id 관리 시스템 및 이를 이용한 서비스 제공 방법
CN109981287A (zh) 一种代码签名方法及其存储介质
CN107135081A (zh) 一种双证书ca系统及其实现方法
CN114760079B (zh) 一种标识网络终端认证方法及相关设备
KR20180052414A (ko) 보안 기기의 인증 기반 연동 장치 및 방법
Luo et al. A self-organized public-key certificate system in p2p network
KR20200094405A (ko) 외국인 고객의 금융통합 인증 정보 공유 시스템, 이를 이용한 외국인 인증 방법 및 인증 정보 관리 방법
NZ745996B2 (en) Systems and methods for distributed identity verification
NZ745996A (en) Systems and methods for distributed identity verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: XI'AN IWNCOMM CO., LTD.

Free format text: FORMER NAME: XIDIAN JIETONG WIRELESS NETWORK COMMUNICATION CO LTD, XI'AN

CP01 Change in the name or title of a patent holder

Address after: High tech Zone technology two road 710075 Shaanxi city of Xi'an Province, No. 68 Xi'an Software Park A201

Patentee after: CHINA IWNCOMM Co.,Ltd.

Address before: High tech Zone technology two road 710075 Shaanxi city of Xi'an Province, No. 68 Xi'an Software Park A201

Patentee before: CHINA IWNCOMM Co.,Ltd.

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: BEIJING ZHIXIANG TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2016610000049

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20161117

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: BEIJING FENGHUO LIANTUO TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000001

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20170106

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHANGHAI YU FLY MILKY WAY SCIENCE AND TECHNOLOGY CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000005

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20170317

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Beijing next Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000014

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20170601

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: HYTERA COMMUNICATIONS Corp.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000015

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20170602

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Beijing Hua Xinaotian network technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000028

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20171122

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: ALPINE ELECTRONICS, Inc.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017990000497

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20171222

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHENZHEN RAKWIRELESS TECHNOLOGY CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000006

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20180226

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHENZHEN M&W SMART CARD CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000008

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20180319

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHENZHEN M&W SMART CARD CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000009

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20180320

Application publication date: 20081015

Assignee: SHENZHEN M&W SMART CARD CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000010

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20180322

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: BLACKSHARK TECHNOLOGIES (NANCHANG) Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000012

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20180404

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Sony Mobile Communications AB

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018990000306

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20181123

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHENZHEN UCLOUDLINK NEW TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2019610000002

Denomination of invention: Entity bidirectional identification method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20191010

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: HANGZHOU STRONG EDUCATION TECHNOLOGY Co.,Ltd.

Assignor: China IWNCOMM Co.,Ltd.

Contract record no.: X2021610000001

Denomination of invention: An entity bidirectional authentication method supporting fast handoff

Granted publication date: 20100512

License type: Common License

Record date: 20210125

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: EKC communication technology (Shenzhen) Co.,Ltd.

Assignor: China IWNCOMM Co.,Ltd.

Contract record no.: X2021610000008

Denomination of invention: An entity bidirectional authentication method supporting fast handoff

Granted publication date: 20100512

License type: Common License

Record date: 20210705

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Guangzhou nengchuang Information Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2021610000011

Denomination of invention: An entity bidirectional authentication method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20211104

Application publication date: 20081015

Assignee: Xinruiya Technology (Beijing) Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2021610000012

Denomination of invention: An entity bidirectional authentication method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20211104

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHENZHEN ZHIKAI TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2022610000005

Denomination of invention: An entity bidirectional authentication method supporting fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20220531

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: HISCENE INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2023610000003

Denomination of invention: A Bidirectional Entity Authentication Method Supporting Fast Switching

Granted publication date: 20100512

License type: Common License

Record date: 20230207

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Beijing baicaibang Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2023610000005

Denomination of invention: A Bidirectional Entity Authentication Method Supporting Fast Switching

Granted publication date: 20100512

License type: Common License

Record date: 20230329

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Shenzhen wisky Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2023610000008

Denomination of invention: A Bidirectional Entity Authentication Method Supporting Fast Switching

Granted publication date: 20100512

License type: Common License

Record date: 20230522

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Beijing Digital Technology (Shanghai) Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2023610000012

Denomination of invention: A Bidirectional Entity Authentication Method Supporting Fast Switching

Granted publication date: 20100512

License type: Common License

Record date: 20231114

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: SHENZHEN JINGYI SMART TECHNOLOGY CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2024610000002

Denomination of invention: A Bidirectional Entity Authentication Method Supporting Fast Switching

Granted publication date: 20100512

License type: Common License

Record date: 20240520

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081015

Assignee: Nanjing Wanxin Donglian Intelligent Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2024610000005

Denomination of invention: A bidirectional entity authentication method that supports fast switching

Granted publication date: 20100512

License type: Common License

Record date: 20241025